Which of the following is a block cipher?

A) Blow fish
B) AES
C) IDEA
D) All of the above


D) All of the above

Computer Science & Information Technology

You might also like to view...

The UNIX editor vi allows searching in both directions, with wrap around if necessary. If the sequence of lines is stored as a linked list, which of the following is most reasonable?

a. singly linked list b. doubly linked list c. circular singly linked list d. circular doubly linked list e. none of the above

Computer Science & Information Technology

____ is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues, and business risks.

A. ISO/IEC 27001 B. ISO/IEC 27002 C. COBIT D. ISACA

Computer Science & Information Technology

In the Gallery, you can mouse over a piece of clip art to view its description and name in a(n) ________

A) ScreenTip B) separate document C) clip art field D) illustration pane

Computer Science & Information Technology

____________________ is the process of identifying risk, as represented by vulnerabilities, to an organization's information assets and infrastructure, and taking steps to reduce this risk to an acceptable level.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology